Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Jinfornet Jreport 15.6 - Local File Inclusion

By kannthu

High
Vidoc logoVidoc Module
#jreport#jinfornet#lfi
Description

What is "Jinfornet Jreport 15.6 - Local File Inclusion?"

The "Jinfornet Jreport 15.6 - Local File Inclusion" module is designed to detect a vulnerability in the Jinfornet Jreport 15.6 software. This vulnerability, classified as CWE-22, allows for local file inclusion through the Jreport Help function in the SendFileServlet. The severity of this vulnerability is high, with a CVSS score of 7.5.

Author: 0x_Akoko

Impact

If exploited, this vulnerability allows remote unauthenticated users to view sensitive files on the target system. In this case, it allows access to the "/etc/passwd" file, which contains important system information, such as user account details.

How does the module work?

The module sends an HTTP GET request to the target system with a specific path that includes directory traversal sequences. For example:

/jreport/sendfile/help/../../../../../../../../../../../../../../etc/passwd

The module then applies matching conditions to the response to determine if the vulnerability is present. The matching conditions include:

- Checking if the response body contains the string "root:[x*]:0:0" - Verifying that the response status code is 200

If both conditions are met, the module reports the vulnerability.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/jreport/sendfile/he...
Matching conditions
regex: root:[x*]:0:0and
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability